Releases: Azure/AKS
2019-08-05
This release is rolling out to all regions
Please Note: This release includes new Kubernetes versions 1.13.9 &
1.14.5 (GA today) these include the fixes for CVEs CVE-2019-11247 and
CVE-2019-11249. Please see our customer guidance
- New Features
- Kubernetes 1.14 is now GA (1.14.5)
- As of Monday August 12th (2019-08-12) customers running Kubernetes 1.10.x
have 60 days (2019-10-14) to upgrade to a supported release. Please see
AKS supported versions document for more information.
- As of Monday August 12th (2019-08-12) customers running Kubernetes 1.10.x
- Kubernetes Audit log
support is now GA.
- Kubernetes 1.14 is now GA (1.14.5)
- Bug Fixes
- Fixed an issue where creating a cluster with a custom subnet would return an
HTTP error 500 vs 400 when the subnet could not be found.
- Fixed an issue where creating a cluster with a custom subnet would return an
- Behavioral Changes
- Preview Features
- Fixed an issue where customers could not create a new node pool with AZs
even if they were already using SLBs. - Fixed an issue where VMSS cluster commands could return the incorrect node
count.
- Fixed an issue where customers could not create a new node pool with AZs
- Component Updates
- aks-engine has been updated to v0.38.7
2019-07-29
This release is rolling out to all regions
-
New Features
- Customers may now create multiple AKS clusters using ARM templates
regardless of what region the clusters are located in.
- Customers may now create multiple AKS clusters using ARM templates
-
Bug Fixes
- AKS has resolved the issue(s) with missing metrics in the default
metrics blade. - An issue where the
--pod-max-pids
was set to 100 (maximum) for clusters
and re-applied during upgrade causingpthread_create() failed (11: Resource temporarily unavailable)
pod start failures was fixed.- See Azure/aks-engine#1623 for more information
- AKS has resolved the issue(s) with missing metrics in the default
-
Preview Features
- AKS is now in Public Preview in the Azure Government (Fairfax, VA)
region. Please note the following:- Azure Portal support for AKS is in progress, for now customers must use the
Azure CLI for all cluster operations currently. - AKS preview features are not supported in Azure Government currently and will
be supported when those features are GA.
- Azure Portal support for AKS is in progress, for now customers must use the
- Fixed an issue where a delete request for a locked VMSS node would get an
incorrect and unclearInternalError
failure - the error message and error
code have both been fixed. - Fixed an issue with egress filtering where managed AKS pods
would incorrectly use the IP address to connect instead of the FQDN. - Fixed an issue with the SLB preview where AKS allowed the customer to
provide an IP address already in use by another SLB. - An issue that prevented customers from using normal cluster operations
on multiple node pool clusters with a single VMSS pool has been fixed.
- AKS is now in Public Preview in the Azure Government (Fairfax, VA)
-
Component Updates
- AKS-Engine has been updated to v0.38.4
Release 2019-07-22
This release is currently being rolled out to all regions
- Preview Features
- An issue where New Windows node pools in existing cluster would not get
updated Windows versions has been fixed. - TCP reset has been set for all new clusters using the SLB preview.
- An issue where AKS would trigger a scale operation requested on a previously
deleted VMSS cluster has been fixed.
- An issue where New Windows node pools in existing cluster would not get
- Component Updates
- AKS-Engine has been updated to v0.38.3
Release 2019-07-15
This release is currently being rolled out to all regions
Important behavioral change: All AKS clusters are being updated to pull all needed container images for cluster operations from Azure Container Registry, this means if you have custom allow/deny lists, port filtering, etc you will need to update your network configuration to allow ACR.
Please see the documentation for more
information including all required AKS cluster ports and URLs
-
New Features
- Support for the M, NC_promo and DS_v3 Azure Compute VM SKUs has been added.
-
Bug Fixes
- Fixed an issue with clusters created in Canada and Australia regions between
2019-07-09 and 2019-07-10 as well as US region clusters created on 2019-07-10
where customers would receiveerror: Changing property 'platformFaultDomainCount' is not allowed
errors.
- Fixed an issue with clusters created in Canada and Australia regions between
-
Behavioral Changes
- The error message returned to users when attempting to create clusters with
an unsupported Kubernetes version in that region has been fixed. - Noted above, AKS has moved all container images required by AKS clusters for
cluster CRUD operations have been moved to Azure Container Registry. This
means that customers must update allow/deny rules and ports. See:
Required ports and addresses for AKS clusters
- The error message returned to users when attempting to create clusters with
-
Preview Features
- Fixed a VMSS cluster upgrade failure that would return:
Changing property 'type' is not allowed.
- An issue where
az aks nodepool list
would return the incorrect node count
has been resolved.
- Fixed a VMSS cluster upgrade failure that would return:
-
Component Updates
- The Azure Monitor for Container agent has been updated to the 2019-07-09 release
- Please see the release notes.
- The Azure Monitor for Container agent has been updated to the 2019-07-09 release
2019-07-08
- New Features
- Kubernetes versions 1.11.10 and 1.13.7 have been added. Customers
are encouraged to upgrade.- For information on how AKS handles Kubernetes version support see:
Supported Kubernetes versions in Azure
- For information on how AKS handles Kubernetes version support see:
- The
az aks update-credentials
command now supports Azure tenant migration of your
AKS cluster. Follow the instructions in Choose to update or create a service principal and then execute theUpdate AKS cluster with new credentials
command passing in the--tenant-id
argument.
- Kubernetes versions 1.11.10 and 1.13.7 have been added. Customers
- Behavioral Changes
- All new clusters now have --protect-kernel-defaults enabled.
- Preview Features
- Kubernetes 1.14.3 is now available for preview users.
- Azure availability zone support is now in public preview.
- This feature enables customers to distribute their AKS clusters across
availability zones providing a higher level of availability. - Please see AKS previews for additional information.
- This feature enables customers to distribute their AKS clusters across
- For all previews, please see the previews document for opt-in
instructions and documentation links.
- Component Updates
- aks-engine has been updated to version 0.37.5
- Azure CNI has been updated to version 1.0.22
- Moby has been updated to 3.0.5 from 3.0.4
- Note that this version number is Azure specific, the Moby project does not
have official releases / release numbers.
- Note that this version number is Azure specific, the Moby project does not
Q: Why is it called "canning" if it's storing things in glass containers and not cans?
A: Because renaming it at this point would be jarring.
Release 2019-07-01
- Bug Fixes
- Fixed an issue with
az aks update-credentials
where the command would
not take special characters and nodes would get incorrect values.
Note that double quote"
, backslash\
, ampersand&
, and angle quotations<>
are still NOT allowed to be used as password characters. - Fixed an issue with update-credentials where the command would not work for VMSS clusters
with more than 10 instances. - AKS now has validation to check for Resource Locks when performing Scale and Upgrade operations.
- Fixed an issue where GPU nodes could fail to install the GPU driver due to ongoing
background apt operations. - Adjusted the timeout value for Service Principal update based on the number of nodes in the
cluster, to accommodate larger clusters.
- Fixed an issue with
- New Features
- AKS now supports OS disk sizes of up to 2048GiB.
- Persistent Tags
- Custom tags can now be passed to AKS and will persisted onto the MC infrastructure Resource Group.
Note: They will NOT be applied to all child resources in that RG, aka VMs, VNets, disks, etc.
- Custom tags can now be passed to AKS and will persisted onto the MC infrastructure Resource Group.
- Preview Features
- Windows Node Pools
- AKS updated Windows default image to latest windows patch release.
- API server authorized IP ranges
- The max number of API server authorized IP ranges has now increased to 100.
- Windows Node Pools
- Component Updates
- AKS-Engine has been updated to v0.35.6
- This change includes a new AKS VHD with the Linux Kernel CVE fixes. See more:
https://github.com/Azure/AKS/issues/ - This new VHD also fixes broken IPv6 support for the host.
- This change includes a new AKS VHD with the Linux Kernel CVE fixes. See more:
- AKS-Engine has been updated to v0.35.6
Release 2019-06-24
- Bug Fixes
- Fixed an issue that could result in a failed service principal update and
AKS cluster creation. - Fixed an issue where deploying AKS clusters using ARM templates without a
defined Service Principal would incorrectly pass validation.
- Fixed an issue that could result in a failed service principal update and
- Preview Features
- Azure Standard load balancer support is now in public preview.
- This has been a long awaited feature which enables selection of the SKU
type offered by Azure Load Balancer to be used with your AKS cluster. Please see
AKS previews for additional information.
- This has been a long awaited feature which enables selection of the SKU
- For all previews, please see the previews document for opt-in
instructions and documentation links.
- Azure Standard load balancer support is now in public preview.
- Component Updates
- The Azure Monitor for Container agent has been updated to the 2019-06-14 release
- Please see the release notes.
- The Azure Monitor for Container agent has been updated to the 2019-06-14 release
Release 2019-06-18
-
Behavioral Changes
- Important: Change in UDR and subnet behavior
- When using Kubenet with a custom subnet, AKS now checks if there is an
existing associated route table. - If that is the case AKS will NOT attach the kubenet RT/Routes automatically
and they should be added manually to the existing RT. - If no Route Table exists AKS will automatically attach the kubenet RT/Routes.
- When using Kubenet with a custom subnet, AKS now checks if there is an
- Important: Change in UDR and subnet behavior
-
Preview Features
- A bug where users could not scale VMSS based clusters after disabling the
cluster autoscaler has been fixed. - A missing CRD for calico-enabled clusters (#1042) has been fixed.
- A bug where users could not scale VMSS based clusters after disabling the
Release 2019-06-10
-
Bug Fixes
- Kubernetes taints and tolerations are now supported in all AKS regions.
- Taints & Tolerations are preserved for current cluster nodes and
through upgrades, however they are not preserved through scale (up,
down) operations.
- Taints & Tolerations are preserved for current cluster nodes and
- Kubernetes taints and tolerations are now supported in all AKS regions.
-
Preview Features
- A bug that prevented cluster agent pool deletions due to VMSS creation
failures has been fixed. - A bug preventing the cluster autoscaler from working with nodepool enabled
clusters (one or more nodepools) has been fixed. - A bug where the NSG would not be reset as needed during a nodepool create
request has been fixed.
- A bug that prevented cluster agent pool deletions due to VMSS creation
-
Behavioral changes
- AKS removed all weak CBC suite ciphers for API server. More info: https://blog.qualys.com/technology/2019/04/22/zombie-poodle-and-goldendoodle-vulnerabilities
-
Component Updates
- AKS-Engine has been updated to v0.35.4
2019-05-28
-
New Features
- AKS is now available in both China East 2 / China North 2 Azure Regions.
- AKS is now available in South Africa North
- The L and M series Virtual Machines are now supported
-
Component Updates
- AKS-Engine has been updated to version 0.35.3
- CoreDNS has been upgraded from 1.2.2 to version 1.2.6
-
Preview Features
- A bug where users could not delete an agent pool containing VMSS nodes if
the VMSS node creation fails has been fixed.
- A bug where users could not delete an agent pool containing VMSS nodes if
Q: How do you organize an outer space party?
A: You planet.